Question No: 161 – (Topic 2)

Which of the following authentication methods is used to enable a Web browser to provide credentials when making a request during an HTTP transaction?

Anonymous authentication

Basic authentication

Digest authentication

Integrated Windows authentication

Answer: B

Question No: 162 – (Topic 2)

You work as a Network Administrator for Net Perfect Inc. The company has a TCP/IP- based network environment. The network contains a Cisco Catalyst router to connect the internal network to the Internet. You want to secure your network from various attacks such as virus, spam, spyware, phishing, etc. You want to secure the whole network through a separate hardware device. Which of the following will you use?

PIX-Firewall

IDS

IPS

ASA

Answer: D

Question No: 163 – (Topic 2)

Which of the following components are usually found in an Intrusion detection system (IDS)?

Each correct answer represents a complete solution. Choose two.

Console

Firewall

Modem

Gateway

Sensor

Answer: A,E

Question No: 164 – (Topic 2)

Which of the following tools provides a visual diagram of a network?

Network Mapper

Network analyzer

Time Domain Reflectometer (TDR)

System Monitor

Answer: A

Question No: 165 – (Topic 2)

You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Active Directory-based single domain single forest network. The company#39;s network is connected to the Internet through a T1 line. The firewall is configured on the network for securing the internal network from the intruders on the Internet. The functional level of the forest is Windows Server 2008. You are designing a public key infrastructure (PKI) for the network. The network will use a root enterprise certificate authority (CA) and a subordinate CA. The root CA will be used to issue certificates to the subordinate CA, and the subordinate CA will be used to issue certificates to the clients.

The management of the company wants to ensure that the security of high-level CAs is not compromised. Which of the following steps will you take to accomplish the task?

Take the root CA offline after it issues certificates to its subordinate CAs.

Take the subordinate CA offline after it gets the certificates from the root CA.

Place all CA servers in a locked room.

Configure a firewall on the network.

Answer: A

Question No: 166 – (Topic 2)

Which of the following functions can you use to mitigate a command injection attack? Each correct answer represents a complete solution. Choose all that apply.

escapeshellcmd()

escapeshellarg()

htmlentities()

strip_tags()

Answer: A,B

Question No: 167 – (Topic 2)

Which of the following attributes is a tool that does not aid the project manager in quality planning?

Benchmarking practices

Design of experiments

Media selection

Benefit of analysis

Answer: C

Question No: 168 – (Topic 2)

Which of the following attacks does Management Frame Protection help to mitigate? Each correct answer represents a complete solution. Choose two.

Replay attack

DoS attack

DDoS attack

Man-in-the-middle attack

Answer: B,D

Question No: 169 – (Topic 2)

This type of virus infects programs that can execute and load into memory to perform predefined steps for infecting systems. It infects files with the extensions .EXE, .COM, .BIN, and .SYS. As it can replicate or destroy these types of files, the operating system becomes corrupted and needs reinstallation. This type of virus is known as .

Stealth virus

Multipartite virus

File virus

Polymorphic virus

Boot sector virus

Answer: C

Question No: 170 – (Topic 2)

Which of the following protocols provides mail forwarding and information storing features?